"don't have direct evidence that conclusively points to a particular nation state" behind the scheme

If all IP's point back to one country that country either is the victim of being a patsy "They must have routed all their traffic trough our unsuspecting country. We were set up! Those bastards!!" or they they did it. Do we think any country is going to admit it even if they are caught red handed? Of course not.

As an aside, anytime I set a box in the DMZ and review access logs, the majority of IPs attempting access are from CN. Which tells me there are LOTS of pwned boxes in CN...or...they're up to something.

Except that there is another report which has just been released which gives a direct link to China for [secureworks.com]. If McAfee don't have direct evidence, that means that they have released the report before they completed the work; they should have done something to identify the end point. Someone should discuss with one of the security services to put a poisoned document with an MSWord zero day which phones home when given a chance into one of their document caches and then see where it turns up.

well, if you were doing shit like that on a payroll and had five years for it.. you could just setup some patsy proxies back and forth and preferably with countries which don't get along with each other.. kinda hard for them then to co-operate simultaneously to expose the whole chain, even if they wanted, and the police officials in each of those countries don't know if they want to co-operate or not as they don't know if it's approved or not operation.

The problem with your theory is this: You don't blame the US government when old Spam King pounds the living shit out of FB do you? The USA is #1 in spamming last I checked (Amazing, we're #1 at something? why hasn't this been outsourced already?) but I doubt seriously Obama is sitting in the White House going "Hey, ya know what? Why isn't their more herbal viagra ads and cheap webcam whores in my inbox. That just ain't right. tell the guys at the Pentagon to get on that shit."

While I wouldn't be surprised if SOME of it is the Chinese government because to quote a line from one of my favorite movies:"You know how they do this? Its because they fucking steal, they steal every idea that ain't nailed down" and this is SOP among governments. We used to pay a bounty for any pilot that would bring us the latest Soviet fighters, Israel stole the Mirage V to make Nesher after they were embargoed, and the Chinese paid dirt farmers to dig up the F117 that crashed in Kosovo so they could snatch stealth tech.

But to say it is the government doing something you need more than an IP address coming from that country, hell you need more than an IP address coming from a governmental IP block. Or did everyone forget when the plans for Marine One and several other top secret highly classified docs ended up on Kazaa because some brain trust working in Washington decided to install P2P and share the whole drive? I kinda doubt that was SOP at the Pentagon even though it would have shown up as a government IP address. I can just imagine the doc written to support P2P in the government: "If the unit lacks sufficient adult entertainment or popular entertainment (as defined by 154c-current billboard (tm) top 100) then after getting approval from an immediate superior one may install ONE and ONLY one approved P2P from the approved list after watching training film 475f-How to get teh titties and tunez, P2P and you."

The problem with your theory is this: You don't blame the US government when old Spam King pounds the living shit out of FB do you?

The key difference here is that you know that it was the spam king because there was a public prosecution for the spamming. Show clear evidence of even an investigation by the Chinese authorities in cooperation with the companies making the reports and you would have a very clear point. China is not a country like Sudan where there is no effective government. They are fully capable of launching detailed police investigations into hacking if they wish to.

Not only that it is pretty common knowledge there are TWO sets of laws in China, one for when Chinese steal from outsiders, one for when Chinese steal from another Chinese. Chinese steals tech from a Brit or USA corp? Slap on the wrist. Another Chinese corp? Executed.

The reason this is because either directly or indirectly the stealing from outsiders benefits the Chinese by giving them the tech without the pesky R&D. As I said we have ALL done it. The Russians based the TU4 on B29s we had to set down th

"don't have direct evidence that conclusively points to a particular nation state" behind the scheme

If all IP's point back to one country that country either is the victim of being a patsy "They must have routed all their traffic trough our unsuspecting country. We were set up! Those bastards!!" or they they did it. Do we think any country is going to admit it even if they are caught red handed? Of course not.

Some of the companies and agencies are well aware of the damage that can be done by disclosure of this. Never mind that the F35 plans have been stolen and that other intellectual property has been taken. The theft reported here and others are condoned, possibly sponsored and maybe directly involved by China. That's not a scare tactic, it's a fact. China doesn't have to have direct involvement in this matter. They can provide technology, access and foster the culture that allows this to continue. There

Fair trade should be fostered but not at the expense of your own country both in terms of it's economic viability but its social structure as well.

I think that's the wrong attitude. If fair trade is fostered then that's fine. If the other country does better out of it then that's just spreading the wealth about fairly. The problem is that currently the trade is not fair. There must be equivalent or better situations in terms of environmental conditions, working conditions, and freedom. Those are reasonable things to insist on for fair trade. In the meantime, you can't insist on a set of IP laws which let the US use all of China's inventions fo

There must be equivalent or better situations in terms of environmental conditions, working conditions, and freedom.

I could not agree more. I am against tariffs as a protectionist measure; however, I think that a $$$ tariff on worker's rights, environmental conditions and other such things would do a lot to stabalise the current race-to-the-bottom that has gutted the US manufacturing industry.

So... you want to pay your workers 10c per day? Fine, we will slap a tariff on that assume they got $8 per hour.

The only problem with such a measure, is that it would become highly political, and thus butchered so that it doe

Reading the details I really wonder why this is supposed to be a government-backed up attack. Neither the trojan nor the attack vector described by the guy from Symantec look very sophisticated to me. From a government-sponsored attack I'd at least expect some previously unknown exploits, rootkit, traffic tunneling, anti-virus product circumvention and generally more efforts to hide that there is a trojan or an outgoing connection.

There must be something missing. So, what's so special about this particular persistent attack?

I know others have found more, but McAfee were very clear that there could have been more, but they were only reporting what was in the logs they found. Anyway the point stands that you don't need especially sophisticated stuff to achieve success, especially once you have a beachhead inside the organization.

The more sophisticated the attack, the smaller the pool of suspects. An attack only needs to be sophisticated enough to succeed and additional complexity may cause additional problems. If an attacker achieves their goals with a unsophisticated attack, then they leave a larger pool of suspects for investigators to focus on.

Hardly any of the trojans used by Chinese APT actors are sophisticated at all. All these sophisticated features you listed are fine if you're only looking to launch a single-purpose attack, like a Stuxnet. The Chinese APT actors want to maintain a long-term presence even after they are discovered on the network.

As the sophistication of the malware rises, so does the cost/time involved, so it limits how many trojans you can deploy at once. Once your super-sophisticated trojan with rootkit, traffic tunneling,

Reading the details I really wonder why this is supposed to be a government-backed up attack. Neither the trojan nor the attack vector described by the guy from Symantec look very sophisticated to me. From a government-sponsored attack I'd at least expect some previously unknown exploits, rootkit, traffic tunneling, anti-virus product circumvention and generally more efforts to hide that there is a trojan or an outgoing connection.

There must be something missing. So, what's so special about this particular persistent attack?

Obviously, you've been missing the point of government deals. case in point: security of several us governmental organizations websites, emails etc(proven last time by todays release from anon), quality of governmental contractors in general. you really think China has it any better?

Alperovitch told Xinhua that they "don't have direct evidence that conclusively points to a particular nation state" behind the scheme.

The McAfee report on Tuesday had said that the campaign was likely sponsored by a nation state because of the breadth and tenacity of the attacks and the information that was accessed.

Not having read the original report nor the full interview transcript (neither of which seem like reliable sources), I don't see anything contradictory. Combine the quotes and it's still perfectly reasonable:

The McAfee report says that the campaign was likely sponsored by a nation state because of the breadth and tenacity of the attacks and the information that was accessed. However, they don't have direct evidence that conclusively points to a particular nation state.

In my original post [slashdot.org], I raise the question that this is not a cyberwar but a marketing campaign aim to grab money from taxpayers around the world. Yet such important points are edited out by/.

That's exactly what I was thinking. Who says that they actually even talked with someone from McAfee, or if they did, that this is what McAfee said? If China's running a massive cyberwar and a security company calls you out for it, what else would they do but claim to have spoken with the security company and gotten a denial? This reeks of Chinese propaganda.

the global realm of capitalism, sticking your dick in the eye of the second largest
economy in the world is still considered poor enough form. Besides, one would conject
the source of an attack is not Mcaffee's priority, rather its vector, mitigation, methods and
ostensibly its impact.

nations, now they do a bang-up job of figuring out what enemy-du-jour of the state has perpetrated
the heinous act of knowing more about computers than they do.

(05:13:21 PM) bradass87: oh, btw... china has a massive botnet
(05:13:31 PM) bradass87: 45+ million, grows 100,000 every two weeks
(05:14:44 PM) bradass87: it pings eucom and pacom servers every two weeks at the same time... spread out slightly to prevent the bandwidth from being detected (it was identified at 20 million in late 2008)
(05:15:53 PM) bradass87: 45+ million ip addresses... i figure they must have a pre-installed system on consumer electronics
(05:20:00 PM) bradass87: are you familiar with the Byzantine problem sets?
(05:22:15 PM) info@adrianlamo.com: nope
(05:23:10 PM) bradass87: Byzantine is the code word for all the chinese infiltration problem sets... the ones that get.mil info... as well as penetrate google (like what became public earlier this year)
(05:23:16 PM) bradass87: yahoo, etc
(05:23:23 PM) bradass87: mostly.gov and.mil
(05:23:46 PM) bradass87: there are several sub-problem sets...
(05:24:15 PM) bradass87: Byzantine Candor, for instance
(05:24:51 PM) bradass87: its what 95% of information warfare people work on in DoD
(05:25:15 PM) bradass87: china can knock out any network in the world with a DDos
(05:36:07 PM) bradass87: their gateways throughout the world are clearly identified, and are being tracked carefully

There was no direct evidence that Google was functioning as a pawn in US foreign policy regarding China, but that didn't stop Xinhua from alluding to the allegations (that came from their political superiors).http://news.xinhuanet.com/english2010/sci/2010-01/24/c_13148771.htm [xinhuanet.com]Maybe Xinhua isn't the best source for a neutral perspective.

So, what the article is really saying is that McAfee in an interview with Xinhua (a subsidiary of State-owned Assets Supervision and Administration Commission of the State Council "SASAC") denied that they thought the "Gubm't did it". Awesome.

Big Business continues to kiss the Chinese Governments butt out of fear of loosing there cheep sweatshop labor.
Nothing to see here wake me up when McAfee makes a Free Tibet version of there product. or GM Signs the Dali lama as a spokes person.

Wow, i am sure the share holders are happy to hear that McAfee's credibility went out the window when they contradicted themselves from a previous report. Now, I can never fully trust what they say, as I see, they are either wrong...and dont know what they are doing, or are quick to contradict themselves, when the payday is big enough.